-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2023-08-19 | MAIN --> PROD | DEV (320894f) --> STAGING #1882
Conversation
…ferences-in-federal-awards-are-unique
Closes #1580 In this PR: Adding steps to the full-submission test to include the audit report PDF upload Removing the disabling of the upload button, since incomplete forms are already handled and it messed with the Cypress test Testing: Cypress tests should pass and PDF uploading should still work locally. --------- Co-authored-by: Phil Dominguez <“philip.dominguez@gsa.gov”>
* Coverage Attempt to setup Coverage Reports on PRs * Temporarily disable PR Checks * Set tests to run on Pull Requests Testing Only * add -i flag * Testing Coverage XML Generate * Move Coverage Back * Testing a different action * Test compose cp * test relative path on container * Test docker cp * set relative path * Seperate copy command * add gh token and set permissions on job * add optional inputs and set values * Re-enable PR Checks * disable invocation of tests seperately * Finalize changes to optional args * reformat from build to match from gchr * Add show missing coverage * Add link to missing lines * remove `show_missing_links`
* Updated cog_over_assignment per feedback * TestCase for cog_over_assignment function * Tested Django TestCase * Fixed formatting with black * WIP - Cog assignment using 2019 data * WIP cog over * WIP 2019 baseline implementation for cog / over * WIP Using 2019 data for cog_over_assignment * WIP Using 2019 data for cog_over_assignment * WIP Test Cases for cog_over_assignment * WIP Refactor assignment logic * WIP Split testcases into separate functions * WIP Cog / Over using CognizantBaseline table * Merge changes by sudha * Merged main * WIP Updated test case names * WIP Renamed test_cog_over_assignment.py to test_cog_agency.py * WIP cog / over using Cognizantbaseline table * Populate baseline table * Merge and lint * rm refs to census2019 * Fix linter warnings * WIP cog / over assignment prior to ETL * More linting.. * Added asserts in test_cog_over.py and doing cog/over assignment in models.py * Formatted files, tested cog_over * Add instructions for CognizantBaseline fixture * Resolve migrations by merging * Reload config from main * fix lhci --------- Co-authored-by: JeanMarie Mariadassou <JeanMarie.Mariadassou@gsa.gov> Co-authored-by: Matt Jadud <matthew.jadud@gsa.gov> Co-authored-by: Alex Steel <130377221+asteel-gsa@users.noreply.github.com>
…nd federal awards audit findings workbooks (#1862) * #1805 Refactored code to avoid duplication * #1805 Renamed files/code to improve readability * #1805 Renamed files/code to improve readability * #1805 Added error message * #1805 Added logic to check for award reference declaration * #1805 Added test cases * #1805 Added newly created cross-validation method to the queue * #1805 Bug fix * #1805 Linting * Update backend/audit/cross_validation/__init__.py --------- Co-authored-by: Matthew Jadud <matthew.jadud@gsa.gov>
…-all-award-references-in-federal-awards-are-unique 1848 cross validation make sure all award references in federal awards are unique
This pull request sets up GitHub code scanning for this repository. Once the scans have completed and the checks have passed, the analysis results for this pull request branch will appear on this overview. Once you merge this pull request, the 'Security' tab will show more code scanning analysis results (for example, for the default branch). Depending on your configuration and choice of analysis tool, future pull requests will be annotated with code scanning analysis results. For more information about GitHub code scanning, check out the documentation. |
Terraform plan for production Plan: 0 to add, 3 to change, 2 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
~ update in-place
- destroy
Terraform will perform the following actions:
# module.production.cloudfoundry_app.postgrest will be updated in-place
~ resource "cloudfoundry_app" "postgrest" {
~ docker_image = "ghcr.io/gsa-tts/fac/postgrest@sha256:53acdb91a92d31d17020b6f60dc34ba47c454827cb59f814ede01fb539754247" -> "ghcr.io/gsa-tts/fac/postgrest@sha256:5cb1228f3d1fc6f3d0151a99180d11b38488c9dd7a2eafd95e9e309d3c2fd9e8"
~ environment = (sensitive value)
id = "70ac44be-3507-4867-a75f-c2d1ab12ee89"
~ id_bg = "************************************" -> (known after apply)
name = "postgrest"
# (12 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.production.cloudfoundry_app.swagger will be destroyed
# (because cloudfoundry_app.swagger is not in configuration)
- resource "cloudfoundry_app" "swagger" {
- disk_quota = 256 -> null
- docker_image = "swaggerapi/swagger-ui:latest" -> null
- enable_ssh = true -> null
- environment = (sensitive value) -> null
- health_check_invocation_timeout = 0 -> null
- health_check_timeout = 0 -> null
- health_check_type = "process" -> null
- id = "3f83d812-318f-49ab-b853-8c8ddbf02718" -> null
- id_bg = "3f83d812-318f-49ab-b853-8c8ddbf02718" -> null
- instances = 2 -> null
- memory = 256 -> null
- name = "swagger" -> null
- ports = [] -> null
- space = "5593dba8-7023-49a5-bdbe-e809fe23edf9" -> null
- stopped = false -> null
- strategy = "rolling" -> null
- timeout = 20 -> null
- routes {
- port = 0 -> null
- route = "9f004253-79d9-4edb-b069-70b3a457e9b5" -> null
}
}
# module.production.cloudfoundry_route.swagger will be destroyed
# (because cloudfoundry_route.swagger is not in configuration)
- resource "cloudfoundry_route" "swagger" {
- domain = "50ba3f69-cd54-4963-9172-14f3334b479e" -> null
- endpoint = "fac-production-swagger.app.cloud.gov" -> null
- hostname = "fac-production-swagger" -> null
- id = "9f004253-79d9-4edb-b069-70b3a457e9b5" -> null
- space = "5593dba8-7023-49a5-bdbe-e809fe23edf9" -> null
}
# module.production.module.clamav.cloudfoundry_app.clamav_api will be updated in-place
~ resource "cloudfoundry_app" "clamav_api" {
~ docker_image = "ghcr.io/gsa-tts/fac/clamav@sha256:0f54c4b052f7dfdc2a0c5ef28bcada6c296882932859e29588818b9644e00412" -> "ghcr.io/gsa-tts/fac/clamav@sha256:0c189607a2306ccce672cf570bf503258a5b196a4c84203b224841d1c418afd8"
id = "5d0afa4f-527b-472a-8671-79a60335417f"
name = "fac-av-production"
# (14 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.production.module.https-proxy.cloudfoundry_app.egress_app will be updated in-place
~ resource "cloudfoundry_app" "egress_app" {
id = "5e81ca8b-99cf-41f8-ae42-76652d51a44c"
name = "https-proxy"
~ source_code_hash = "9fcf4a7f6abfc9a220de2b8bb97591ab490a271ac0933b984f606f645319e1a4" -> "e59a40c4e0195f484032d3cc746c985c2ee791531eb72ba994d7b0943575ba36"
# (18 unchanged attributes hidden)
# (1 unchanged block hidden)
}
Plan: 0 to add, 3 to change, 2 to destroy. 📝 Plan generated in Pull Request Checks #610 |
Terraform plan for staging Plan: 0 to add, 2 to change, 0 to destroy.Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
~ update in-place
Terraform will perform the following actions:
# module.staging.module.clamav.cloudfoundry_app.clamav_api will be updated in-place
~ resource "cloudfoundry_app" "clamav_api" {
~ docker_image = "ghcr.io/gsa-tts/fac/clamav@sha256:a1182cf2dbf596260fa7d7a2c996338a76de8f14d3b2a5b558bcbad10ec1e9a6" -> "ghcr.io/gsa-tts/fac/clamav@sha256:0c189607a2306ccce672cf570bf503258a5b196a4c84203b224841d1c418afd8"
id = "d1bea029-d2d3-4b68-b16d-b216bcaea573"
name = "fac-av-staging"
# (14 unchanged attributes hidden)
# (1 unchanged block hidden)
}
# module.staging.module.https-proxy.cloudfoundry_app.egress_app will be updated in-place
~ resource "cloudfoundry_app" "egress_app" {
id = "1c9e7877-3c69-4fe5-8541-7bca3f845eb1"
name = "https-proxy"
~ source_code_hash = "9b63bf9766c73480bf1c2385e259b1321988ede71a7b68ebe5c451d9ff6bf1c1" -> "e59a40c4e0195f484032d3cc746c985c2ee791531eb72ba994d7b0943575ba36"
# (18 unchanged attributes hidden)
# (1 unchanged block hidden)
}
Plan: 0 to add, 2 to change, 0 to destroy. ✅ Plan applied in Deploy to Staging Environment #21 |
Minimum allowed coverage is Generated by 🐒 cobertura-action against 7ab3738 |
* Primary nav, homepage, my submission home * Eligibility steps, part one * Audit access updates * General information form updates * Linting, orphaned tag * Get linted * Accessibility updates (duplicate ids) * Linting - broke a tag. * accessibility: aria-autocomplete is now inline
Closes #1584 In this PR: Creating auditor certification Cypress test Auditor email is now set to whatever the CYPRESS_LOGIN_TEST_EMAIL is set to. This allows the test to access the auditor cert page. Testing: Cypress tests should pass Co-authored-by: Phil Dominguez <“philip.dominguez@gsa.gov”>
uses the always() conditional expression so that it always runs after testing-from-ghcr and testing-from-build terraform-plan-staging have completed, regardless of whether they were successful, so long as the base_ref is prod.
* mock AV scans in fixture tests * lint.
This is an auto-generated pull request to merge main into prod for a staging release on 2023-08-19 with the last commit being merged as 320894f